Hey there, Penetration Testers of Canberra.
If you’ve spent the last few years sharpening your offensive security skills and want to keep pushing your craft forward, this role might be worth a look.
Maybe you’re tired of testing the same environments repeatedly or being embedded with a single client. If you enjoy collaborating with talented people and working across a variety of environments, keep reading.
First of all, what’s in it for you - Salary up to $180k package, depending on experience
- Flexible hybrid setup: typically, around one day in the office and one day working from home, depending on project work
- Work alongside highly capable operators, including CVE discoverers and competition winners
- Clear progression opportunities: the business promotes from within
- Exposure to multiple environments and engagements, rather than a single long-term client
- Opportunities to attend security conferences and industry events
- A distinctly un-corporate culture: smart people doing interesting work without unnecessary hierarchy
The Role
This position sits within the Security Operations function, alongside Security Engineers and other Penetration Testers. You’ll join an existing team of five testers, working collaboratively across engagements and sharing knowledge across the wider security practice.
You’ll lead and deliver penetration testing engagements across applications, infrastructure, cloud environments and devices, working closely with both technical teams and senior stakeholders.
Most consultants typically work across two projects at a time, giving you exposure to a variety of organisations and environments. The work is primarily government-focused, alongside some private sector engagements.
What you’ll be doing - Lead penetration testing engagements from scoping through to execution and reporting
- Conduct advanced security assessments and attack simulations
- Identify vulnerabilities and potential exploit paths across complex environments
- Translate technical findings into clear, actionable recommendations
- Develop and maintain threat models to prioritise vulnerabilities
- Improve internal testing tools, frameworks and methodologies
- Collaborate with teams across engineering, GRC, advisory and assurance
- Contribute to broader initiatives such as vulnerability management, threat hunting and incident response
What's needed?
NV1 AGSVA Security Clearance - Formal penetration testing training or recognised certifications (OSCP, CREST)
- Strong communication skills with the ability to translate technical findings clearly
If you're interested in this, please APPLY directly or share your resume through to me on [email protected].